YoVDO

Beyond the Ballot Box - Securing America’s Supporting Election Technology

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses Risk Management Courses

Course Description

Overview

Explore the critical yet often overlooked aspects of election security in this 27-minute RSA Conference talk. Delve into the Center for Internet Security's recommendations for securing and verifying America's Internet-connected election technology. Learn about the most vulnerable components of election infrastructure and gain insights from a verification pilot project. Discover security best practices, risk-based approaches, and rapid testing methods for election officials. Understand the challenges posed by ransomware and rapid product changes in the election technology landscape. Examine the process of architecture reviews, security claims validation, and the importance of built-in incentives for secure systems. Gain valuable knowledge on how to protect the supporting election technology that plays a crucial role in maintaining the integrity of democratic processes.

Syllabus

Intro
What is supporting election technology
Security best practices
Election officials
Ransomware
Rapid Product Changes
RiskBased Approach
Process Assessment
Architecture Review
Security Claims Validation
Testing Rules Determination
Rapid Testing
Builtin Incentives
Valid Artifacts
Whats Next
Main Questions
Architecture Reviews
Questions


Taught by

RSA Conference

Related Courses

Master Mathematical Cryptography 2020: Crack Any Code
Udemy
Cryptography from Scratch| Master Cryptography in Java
Udemy
Information Security in Python
Udemy
Cryptography
Caleb Curry via YouTube
Linux for Programmers - Public-Private Key Authentication (RSA) and FTP
Tech with Tim via YouTube